CN103488917B - Method for encrypting and protecting system by aid of touch screen device - Google Patents

Method for encrypting and protecting system by aid of touch screen device Download PDF

Info

Publication number
CN103488917B
CN103488917B CN201310404827.4A CN201310404827A CN103488917B CN 103488917 B CN103488917 B CN 103488917B CN 201310404827 A CN201310404827 A CN 201310404827A CN 103488917 B CN103488917 B CN 103488917B
Authority
CN
China
Prior art keywords
touch screen
encryption
ciphertext
encrypted
cleartext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310404827.4A
Other languages
Chinese (zh)
Other versions
CN103488917A (en
Inventor
汪玉龙
李博
唐诗平
植永耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DONGGUAN LESHENG ELECTRONICS CO LTD
Original Assignee
DONGGUAN LESHENG ELECTRONICS CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DONGGUAN LESHENG ELECTRONICS CO LTD filed Critical DONGGUAN LESHENG ELECTRONICS CO LTD
Priority to CN201310404827.4A priority Critical patent/CN103488917B/en
Publication of CN103488917A publication Critical patent/CN103488917A/en
Application granted granted Critical
Publication of CN103488917B publication Critical patent/CN103488917B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a method for encrypting and protecting a system by the aid of a touch screen device. The method includes that a host of the system transmits a plain code message to a touch screen controller; the touch screen controller receives and encrypts the plain code message to generate an encrypted message and feeds the encrypted message back to the host. Compared with the prior art, the method has the advantages that the plain code message from the host is encrypted by the touch screen controller inside the touch screen device, the encrypted message is generated and is fed back to the host, in other words, an encryption function is realized inside the touch screen device (wherein information of plain codes is interchanged with information of the encrypted message via communication interfaces of the host of the system and the touch screen controller), accordingly, critical data (such as account numbers and passwords) inputted by a user can be encrypted before the critical data are transmitted into the host of the system, the problem that critical data are stolen by malicious software when transmitted to external encryption equipment (such as an 'encryption dog') in a plain code message form to be encrypted in the traditional mode is solved, and the safety of the touch screen device is improved; the method brings convenience for encrypting systems of most handheld and mobile equipment.

Description

Touch screen-device is utilized to realize the method for system encryption protection
Technical field
The present invention relates to encryption technology field, relate more specifically to a kind of method utilizing touch screen-device to realize system encryption protection.
Background technology
In order to prevent electronic product to be copied illegally, or in order to control the not controlled production (illegal production) of OEM vendor, to protect the intellecture property of electronics designers not invaded, be necessary to be encrypted protection to electronic product.
Traditional technological means generally adopts hardware " softdog ".Hardware " softdog " is a kind of software cryptography hardware be inserted on electronic product Peripheral Interface, and generally have tens to arrive the non-volatile memory space of hundreds of byte for read-write, advanced hardware encipher dog may comprise the hardware such as single-chip microcomputer.During use, by peripheral bus, hardware " softdog " is connected on the mainboard of system host.Software developer carries out exchanges data (carrying out read-write operation to softdog) by interface function and softdog, check " softdog " whether on Peripheral Interface, or directly with " softdog " upper subsidiary enciphering and deciphering algorithm, encryption and decryption is carried out to critical data.Software developer can arrange many places software locks in software, utilizes " softdog " to open these locks as key, if softdog lacks or " softdog " is not corresponding, software just cannot normally run.
Although aforesaid way can realize the encipherment protection to system host, but there is following shortcoming: (1) is connected by peripheral bus with the main frame of touch screen-device due to " softdog ", some critical datas in main frame are sent in the process of " softdog " in the mode of cleartext, add the probability that this critical data is stolen by Malware; (2) because " softdog " is made up of universal EPROM or MCU usually, anyone can carry out Design and manufacture " softdog " by buying general EPROM or MCU, " softdog " hardware that this mode realizes, because inner parameter can refresh mode to revise by firmware, and disclosed in the specification of general-purpose device is, be easy to obtain, the code that bootlegger can be easily passed through in reading " softdog " cracks " softdog ", and security is lower; (3) " softdog " needs to attach a hardware unit outward in system, and for the hand-held of touch screen and mobile electronic device, this mode can cause the inconvenience used.
Therefore, the encryption method being badly in need of a kind of improvement, to overcome above-mentioned defect, particularly needs a kind of hand-held and system encrypted method that is mobile electronic device of being more suitable for.
Summary of the invention
The object of this invention is to provide a kind of method utilizing touch screen-device to realize system encryption, effectively to solve the inconvenience in use that conventional encryption methods causes, stolen by Malware when critical data cleartext also can be avoided to transfer to extraneous encryption device (as " softdog ") encryption, strengthen the security of touch screen-device.
For achieving the above object, the invention provides a kind of method utilizing touch screen-device to realize encryption, comprising:
Main frame transmits cleartext to touch screen controller;
Described touch screen controller receives and is encrypted with generating ciphertext described cleartext, and described ciphertext is back to described main frame.
Compared with prior art, encryption method of the present invention is encrypted with generating ciphertext the cleartext carrying out from host by the touch screen controller of touch screen-device inside, and ciphertext is back to main frame; That is, achieve encryption function in touch screen-device inside, plain code and cipher-text information carry out message exchange by the communication interface of system host and touch screen controller.Because current most hand-held and mobile device all adopts touch-screen as human-computer interaction interface, and the electronic equipment of other type also adopts touch-screen input mode increasing, the method that therefore the present invention utilizes touch screen-device to realize system encryption effectively can solve the inconvenience in use that conventional encryption methods causes.The critical data (as account number, password) that the method can also input user simultaneously was just encrypted before entering system host, avoid when critical data being sent to extraneous encryption device (as " softdog ") encryption in cleartext mode in traditional approach and stolen by Malware, enhance the security of touch screen-device.
Particularly, in one embodiment of this invention, described touch screen controller comprises micro-control unit, described micro-control unit receives described cleartext, encryption parameter, user cipher and user's sequence number that described micro-control unit will prestore, generate initial key according to key generation logic, described initial key is generated described ciphertext through iterative cryptographic by described micro-control unit, and described ciphertext is back to described main frame.。
Particularly, described micro-control unit receives described cleartext by IIC interface, SPI interface or USB interface and sends described ciphertext.
In another embodiment of the invention, described touch screen controller comprises encryption kernel, described encryption kernel receives described cleartext, encryption parameter, user cipher and user's sequence number that described encryption kernel will prestore, initial key is generated according to key generation logic, described initial key is generated described ciphertext through iterative cryptographic by described encryption kernel, and described ciphertext is back to described main frame.
Particularly, described encryption kernel receives described cleartext by IIC interface, SPI interface or USB interface and sends described ciphertext.
In one more embodiment of the present invention, described touch screen controller comprises micro-control unit and encryption kernel, described encryption kernel receives described cleartext, encryption parameter, user cipher and user's sequence number that described encryption kernel will prestore, initial key is generated according to key generation logic, described initial key is generated described ciphertext through iterative cryptographic by described micro-control unit, and described ciphertext is back to described main frame by described micro-control unit.
Particularly, described encryption kernel receives described cleartext by IIC interface, SPI interface or USB interface, and described micro-control unit sends described ciphertext by IIC interface, SPI interface or USB interface.
Particularly, described initial key is generated described ciphertext through iterative cryptographic specifically to comprise:
Described initial key is generated nine intermediate key through cipher key spreading logic by described encryption kernel;
Described contract quotation message, initial key, nine intermediate key and iterative cryptographic parameter are generated described ciphertext through AES-128 iterative cryptographic algorithm.
Particularly, described cleartext and ciphertext are 128.
By following description also by reference to the accompanying drawings, the present invention will become more clear, and these accompanying drawings are for explaining embodiments of the invention.
Accompanying drawing explanation
Fig. 1 is the touch screen-device structured flowchart realizing touch screen-device encryption method first embodiment of the present invention.
Fig. 2 is the process flow diagram of touch screen-device encryption method first embodiment of the present invention.
Fig. 3 is the schematic diagram of Fig. 2.
Fig. 4 is process flow diagram when system unlocks after using encryption method of the present invention encryption.
Fig. 5 is the touch screen-device structured flowchart realizing touch screen-device encryption method second embodiment of the present invention.
Fig. 6 is the process flow diagram of touch screen-device encryption method second embodiment of the present invention.
Fig. 7 is the structured flowchart of the touch screen-device realizing touch screen-device encryption method the 3rd embodiment of the present invention.
Fig. 8 is the process flow diagram of touch screen-device encryption method the 3rd embodiment of the present invention.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, element numbers similar in accompanying drawing represents similar element
Please refer to Fig. 1, the touch screen-device implementing encryption method first embodiment of the present invention comprises main frame 10, touch screen controller 20 and touch-screen 40.Wherein, main frame 10 comprises processor 101, power module 102, display module 103, memory module 104 and communication module 105, and power module 102, display module 103, memory module 104 and communication module 105 are all connected with processor 101.Touch screen controller 20 comprises micro-control unit (MCU core) 201, power supply 202, storer 203, capacitive transducer 204 and encryption kernel 205, power supply 202, storer 203, capacitive transducer 204 and encryption kernel 205 are all connected with micro-control unit 201, and capacitive transducer 204 is connected with touch-screen 40.The processor 101 of main frame 10 carries out data interaction by IIC interface (or SPI interface or USB interface) with micro-control unit 201 and encryption kernel 205, and micro-control unit 201 shares the reset circuit with processor 101 communication with encryption kernel 205.
It should be noted that the touch-screen in the present embodiment is projected capacitive screen.
Please refer to Fig. 2 and Fig. 3, touch screen-device encryption method of the present invention comprises the following steps:
S201, main frame transmits cleartext to encryption kernel, and encryption kernel is integrated in touch screen controller; Particularly, when designing, can hide multiple software locks in the software of processor 101 running on main frame 10, each software locks all can generate the cleartext of one or more 128 after starting, this cleartext is transferred into the encryption kernel 205 be integrated in touch screen controller 20 by IIC interface;
S202, encryption kernel receives cleartext;
S203, encryption parameter, user cipher and user's sequence number that encryption kernel will prestore, generate initial key according to key generation logic, this initial key is 128;
S204, ciphertext through iterative cryptographic generating ciphertext, and is back to main frame by cleartext and initial key by encryption kernel, thus completes a data encryption process, and wherein, this ciphertext is 128; Particularly, we adopt AES-128 cryptographic algorithm, initial key is generated intermediate key required for nine iteration samsaras through cipher key spreading logic by encryption kernel, cleartext, initial key, nine intermediate key and iterative cryptographic parameter are carried out 10 iteration, final generation ciphertext, and send ciphertext back to main frame by IIC interface.
Please refer to Fig. 4 again, after using above-mentioned encryption method to encrypt, when needing to unlock, its concrete steps are as follows:
S401, main frame encryption software is encrypted to produce ciphertext to the cleartext produced during software startup again; Particularly, when software unlocks application, the encryption software in main frame can be encrypted again to the cleartext produced during software startup, and wherein required encryption key is produced through key generation procedure by user's sequence number that main frame stores and user cipher;
S402, the ciphertext that the ciphertext produce main frame encryption software and encryption kernel produce is resolved; Particularly, ciphertext analysis program is adopted to resolve above-mentioned two ciphertexts;
S403, whether both judgements mate, and if so, then perform S404, otherwise, then perform S405;
S404, software unlocks, and software continues to run;
S405, unlocks unsuccessfully, system-down.
Please refer to Fig. 5 again, the touch screen-device implementing encryption method second embodiment of the present invention comprises main frame 10 ', touch screen controller 20 ' and touch-screen 40 '.With the first embodiment unlike, the touch screen controller 20 ' in the present embodiment does not comprise encryption kernel, micro-control unit 201 ' receive cleartext and send ciphertext, remainder is identical with the first embodiment, does not repeat them here.
Please refer to Fig. 6, touch screen-device encryption method of the present invention comprises the following steps:
S601, main frame transmits cleartext to the micro-control unit in touch screen controller;
S602, micro-control unit receives cleartext;
S603, encryption parameter, user cipher and user's sequence number that micro-control unit will prestore, generate initial key according to key generation logic, this initial key is 128;
S604, ciphertext through iterative cryptographic generating ciphertext, and is back to main frame by cleartext and initial key by micro-control unit, thus completes a data encryption process, and wherein, this ciphertext is 128; Particularly, we adopt AES-128 cryptographic algorithm, initial key is generated intermediate key required for nine iteration samsaras through cipher key spreading logic by encryption kernel, cleartext, initial key, nine intermediate key and iterative cryptographic parameter are carried out 10 iteration, final generation ciphertext, and send ciphertext back to main frame by IIC interface.
Please refer to Fig. 7 again, the touch screen-device implementing encryption method of the present invention 3rd embodiment comprises main frame 10 ' ', touch screen controller 20 ' ' and touch-screen 40 ' '.With the first embodiment unlike, encryption kernel 205 ' in the present embodiment ' receive cleartext, micro-control unit 201 ' ' sending ciphertext, remainder is identical with the first embodiment, does not repeat them here.
Please refer to Fig. 8, touch screen-device encryption method of the present invention comprises the following steps:
S801, main frame transmits cleartext to encryption kernel;
S802, encryption kernel receives cleartext;
S803, encryption parameter, user cipher and user's sequence number that encryption kernel will prestore, generate initial key according to key generation logic, this initial key is 128;
S804, ciphertext through iterative cryptographic generating ciphertext, and is back to main frame by cleartext and initial key by micro-control unit, thus completes a data encryption process, and wherein, this ciphertext is 128; Particularly, we adopt AES-128 cryptographic algorithm, initial key is generated intermediate key required for nine iteration samsaras through cipher key spreading logic by encryption kernel, cleartext, initial key, nine intermediate key and iterative cryptographic parameter are carried out 10 iteration, final generation ciphertext, and send ciphertext back to main frame by IIC interface.
It should be noted that in the second embodiment and the 3rd embodiment, its principle of work and to unlock flow process consistent with the first embodiment, therefore not repeat them here.
As can be seen from the above description, the first embodiment of the present invention have employed the cipher mode of hardware, achieve the encryption to the cleartext that main frame sends in touch screen-device inside, enhance the security of touch screen-device and improve the dirigibility of cipher mode, and without the need to changing motherboard design; The second embodiment of the present invention have employed the cipher mode of pure software, achieves the encryption to the cleartext that main frame sends, enhance the security of touch screen-device, and dirigibility is higher in touch screen-device inside; The third embodiment of the present invention have employed the cipher mode that software restraint (micro-control unit and encryption kernel) combines, the encryption to the cleartext that main frame sends is achieved in touch screen-device inside, in the touch screen circuit that encryption software and encryption hardware are hidden in magnanimity and routine data, make the method being cracked encryption software and hardware by inverse approach feasible hardly, while assuring data security, also improve dirigibility, and this kind of cipher mode is without the need to revising motherboard design.
To sum up; encryption function is achieved in touch screen-device inside; the encipherment protection to system can be realized; and the critical data that can input user (as account number, password) was just encrypted before entering system host; avoid when critical data being sent to extraneous encryption device (as " softdog ") encryption in cleartext mode in traditional approach and stolen by Malware, enhance the security of touch screen-device.And the present invention is most of hand-held and system encryption that is mobile device provides conveniently.
More than in conjunction with most preferred embodiment, invention has been described, but the present invention is not limited to the embodiment of above announcement, and should contain various carry out according to essence of the present invention amendment, equivalent combinations.

Claims (4)

1. utilize touch screen-device to be encrypted a method for protection to system, it is characterized in that, comprising:
Main frame transmits cleartext to touch screen controller;
Described touch screen controller comprises micro-control unit and encryption kernel, described encryption kernel receives described cleartext, encryption parameter, user cipher and user's sequence number that described encryption kernel will prestore, initial key is generated according to key generation logic, described micro-control unit is by described cleartext and described initial key through iterative cryptographic generating ciphertext, and described ciphertext is back to described main frame by described micro-control unit.
2. utilize touch screen-device to be encrypted the method for protection to system as claimed in claim 1; it is characterized in that; described encryption kernel receives described cleartext by IIC interface, SPI interface or USB interface, and described micro-control unit sends described ciphertext by IIC interface, SPI interface or USB interface.
3. the touch screen-device that utilizes as described in any one of claim 1 to 2 is encrypted the method for protection to system, it is characterized in that, described initial key is generated described ciphertext through iterative cryptographic and specifically comprises:
Described initial key is generated nine intermediate key through cipher key spreading logic by described encryption kernel;
Described contract quotation message, initial key, nine intermediate key and iterative cryptographic parameter are generated described ciphertext through AES-128 iterative cryptographic algorithm.
4. utilize touch screen-device to be encrypted the method for protection to system as claimed in claim 3, it is characterized in that, comprising: described cleartext and ciphertext are 128.
CN201310404827.4A 2013-09-06 2013-09-06 Method for encrypting and protecting system by aid of touch screen device Active CN103488917B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310404827.4A CN103488917B (en) 2013-09-06 2013-09-06 Method for encrypting and protecting system by aid of touch screen device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310404827.4A CN103488917B (en) 2013-09-06 2013-09-06 Method for encrypting and protecting system by aid of touch screen device

Publications (2)

Publication Number Publication Date
CN103488917A CN103488917A (en) 2014-01-01
CN103488917B true CN103488917B (en) 2015-04-01

Family

ID=49829132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310404827.4A Active CN103488917B (en) 2013-09-06 2013-09-06 Method for encrypting and protecting system by aid of touch screen device

Country Status (1)

Country Link
CN (1) CN103488917B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015032063A1 (en) * 2013-09-06 2015-03-12 东莞市乐升电子有限公司 Method of using touch screen device for system encryption and protection
CN104253684B (en) * 2014-09-23 2018-02-02 深圳市汇顶科技股份有限公司 Encryption method and encryption device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001018984A1 (en) * 1999-09-03 2001-03-15 Interchips Co., Ltd. Portable terminal suitable for electronic publication system
CN101813992A (en) * 2010-05-07 2010-08-25 深圳视融达科技有限公司 Touch screen and password-inputting method thereof
CN102236329A (en) * 2010-05-05 2011-11-09 河南友利华系统工程有限公司 Safety type industrial monitoring unit

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001018984A1 (en) * 1999-09-03 2001-03-15 Interchips Co., Ltd. Portable terminal suitable for electronic publication system
CN102236329A (en) * 2010-05-05 2011-11-09 河南友利华系统工程有限公司 Safety type industrial monitoring unit
CN101813992A (en) * 2010-05-07 2010-08-25 深圳视融达科技有限公司 Touch screen and password-inputting method thereof

Also Published As

Publication number Publication date
CN103488917A (en) 2014-01-01

Similar Documents

Publication Publication Date Title
JP7257561B2 (en) computer-implemented method, host computer, computer-readable medium
US11665000B2 (en) Method and apparatus for processing privacy data of block chain, device, and storage medium
US10020939B2 (en) Device, server and method for providing secret key encryption and restoration
KR101712784B1 (en) System and method for key management for issuer security domain using global platform specifications
CN113545006B (en) Remote authorized access locked data storage device
US9792427B2 (en) Trusted execution within a distributed computing system
US8683232B2 (en) Secure user/host authentication
CN1985466B (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
CN103946806A (en) Apparatus, system, and method for providing memory access control
WO2017028711A1 (en) Method for processing data, wearable electronic equipment and system
CN114070614B (en) Identity authentication method, apparatus, device, storage medium and computer program product
TW201539247A (en) Password input and verification method and system thereof
CN103873440A (en) Application program upgrading method and system
CN113260992B (en) Multi-device unlocking of data storage devices
KR20210151016A (en) Key protection processing method, apparatus, device and storage medium
CN113316915B (en) Unlocking a data storage device
CN101971182A (en) Finger sensing apparatus with credential release and associated methods
CN104732159A (en) File processing method and file processing device
CN103996117A (en) Safety mobile phone
CN113545021B (en) Registration of pre-authorized devices
CN103971034A (en) Method and device for protecting Java software
US20110107109A1 (en) Storage system and method for managing data security thereof
KR101639714B1 (en) A method for authenticating a device of smart grid
KR101570773B1 (en) Cloud authentication method for securing mobile service
CN103488917B (en) Method for encrypting and protecting system by aid of touch screen device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant